Lecture

Concurrency Control: Lock-Based Protocols

Description

This lecture covers lock-based concurrency control protocols, including Two-Phase Locking (2PL) and deadlock prevention and detection. It also discusses the limitations of flat transactions, transaction savepoints, transaction chains, nested transactions, compensating transactions, and SAGA transactions.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.